Palmprint recognition has been widely applied to security authentication due to its rich characteristics, ie, local direction, wrinkle, and texture. However, different types of palmprint …
D Wei, M Jiang, Y Deng - Expert Systems with Applications, 2023 - Elsevier
In this paper, an encryption algorithm based on hyper-chaotic system and bit-level permutation is proposed. Firstly, the forward diffusion method based on two-dimensional …
The long-term streamflow forecasts are very significant in planing and reservoir operations. The streamflow forecasts have to deal with a complex and highly nonlinear data patterns …
SP Wan, DF Li - IEEE Transactions on Fuzzy Systems, 2013 - ieeexplore.ieee.org
The aim of this paper is to develop a new Atanassov's intuitionistic fuzzy (A-IF) programming method to solve heterogeneous multiattribute group decision-making problems with A-IF …
N Amrouni, A Benzaoui, A Zeroual - Applied Sciences, 2023 - mdpi.com
This paper presents a comprehensive survey examining the prevailing feature extraction methodologies employed within biometric palmprint recognition models. It encompasses a …
Biometric systems consist of devices, algorithms, and procedures used to recognize individuals or classes of individuals based on their physical or behavioral characteristics …
Intrusion detection systems that make use of artificial intelligence techniques in order to improve effectiveness have been actively pursued in the last decade. However, their …
A Meraoumia, S Chitroub… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Biometrics is an effective technology for personnel identity recognition, but uni-modal biometric systems which use a single trait for recognition will suffer from problems like noisy …
D DeCarlo, D Metaxas - … on Computer Vision (IEEE Cat. No …, 1998 - ieeexplore.ieee.org
We present a novel method for the shape and motion estimation of a deformable model using error residuals from model-based motion analysis. The motion of the model is first …